CVE-2020-28045

An unsigned-library issue was discovered in ProlinOS through 2.4.161.8859R. This OS requires installed applications and all system binaries to be signed either by the manufacturer or by the Point Of Sale application developer and distributor. The signature is a 2048-byte RSA signature verified in the kernel prior to ELF execution. Shared libraries, however, do not need to be signed, and they are not verified. An attacker may execute a custom binary by compiling it as a shared object and loading it via LD_PRELOAD.
References
Link Resource
https://git.lsd.cat/g/pax-pwn Exploit Third Party Advisory
https://git.lsd.cat/g/pax-pwn Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:pax:prolinos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:22

Type Values Removed Values Added
References () https://git.lsd.cat/g/pax-pwn - Exploit, Third Party Advisory () https://git.lsd.cat/g/pax-pwn - Exploit, Third Party Advisory

Information

Published : 2020-11-02 21:15

Updated : 2024-11-21 05:22


NVD link : CVE-2020-28045

Mitre link : CVE-2020-28045

CVE.ORG link : CVE-2020-28045


JSON object : View

Products Affected

pax

  • prolinos
CWE
CWE-347

Improper Verification of Cryptographic Signature